what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 1 of 1 RSS Feed

Files

tsl_bind.c
Posted Apr 5, 2010
Authored by Gustavo Scotti, Thiago Zaninotti | Site axur.org

Bind prior to 8.2.3-REL remote root exploit - Includes instructions for finding the offset on linux. Tested against Redhat 6.1 8.2.2-P5 and Slackware. NOTE: This exploit is backdoored to also connect to 151.196.71.160 and dump information regarding the user running the exploit. User beware.

tags | exploit, remote, root
systems | linux, redhat, slackware
SHA-256 | e5d79c60f4264849e22015211b28b4291acc39f85fa920c4f0d83f91c7a2da44
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close